Shupeng Zhang, Yibin Zhang, Xixi Zhang, Yang Peng, Jinlong Sun, Guan Gui, T. Ohtsuki
{"title":"Radio Frequency Signal Dataset Generation Based on LTE System and Variable Channels","authors":"Shupeng Zhang, Yibin Zhang, Xixi Zhang, Yang Peng, Jinlong Sun, Guan Gui, T. Ohtsuki","doi":"10.1109/INFOCOMWKSHPS57453.2023.10225784","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10225784","url":null,"abstract":"Deep learning-based radio frequency fingerprinting (RFF) identification has the potential to enhance the security performance of the physical layer. In recent years, a number of RFF datasets have been proposed to meet the large-scale data requirements for deep learning. However, these datasets are collected from similar channel environments and only contain receiver data. This paper employs different software radio peripherals to generate radio signals. Hence, it is able to adjust the signal's parameters, such as frequency band, modulation style, antenna gain, etc. In this paper, we propose a radio frequency signal dataset based on LTE system and variable channels to more properly characterize the generated signals in the real world. We collect signals at transmitters and receivers to construct the RFF dataset. Moreover, we confirm the dataset's dependability using various machine learning and deep learning methods. The dataset and reproducible code of this paper can be downloaded from GitHub11GitHub link: https://github.com/njuptzsp/XSRPdataset.","PeriodicalId":354290,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128598401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michele Gucciardo, Aristide T.-J. Akem, Beyza Bütün, M. Fiore
{"title":"Demonstrating Flow-Level In-Switch Inference","authors":"Michele Gucciardo, Aristide T.-J. Akem, Beyza Bütün, M. Fiore","doi":"10.1109/INFOCOMWKSHPS57453.2023.10225967","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10225967","url":null,"abstract":"Existing approaches for in-switch inference with Random Forest (RF) models that can run on production-level hardware do not support flow-level features and have limited scalability to the task size. This leads to performance barriers when tackling complex inference problems with sizable decision spaces. Flowrest is a complete RF model framework that fills existing gaps in the existing literature and enables practical flow-level inference in commercial programmable switches. In this demonstration, we exhibit how Flowrest can classify individual traffic flows at line rate in an experimental platform based on Intel Tofino switches. To this end, we run experiments with real-world measurement data, and show how Flowrest yields improvements in accuracy with respect to solutions that are limited to packet-level inference in programmable hardware.","PeriodicalId":354290,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128599338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recurrent Neural Network Based RACH Scheme Minimizing Collisions in 5G and Beyond Networks","authors":"S. Swain, Ashit Subudhi","doi":"10.1109/INFOCOMWKSHPS57453.2023.10226096","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10226096","url":null,"abstract":"Limited preambles in 5G New Radio (NR) can be a bottleneck on the performance of network access procedures. Due to the limited number of preambles, there is a non-zero probability that two mobile User Equipments (UEs) selecting same preamble signatures leading to collisions. Consequently, the base stations (gNBs) in 5G Radio Access Network (RAN) are unable to send a response to the UEs. Furthermore, with the increase in the number of cellular UEs and Machine Type Communication (MTC) devices, the probability of such preamble collisions further increases, thereby leading to reattempts by UEs. This in turn, results in increased latency and reduced channel utilization. In order to reduce contention during preamble access, we propose to use deep learning based models to design a Random Access Channel (RACH) procedure that predicts the incoming connection requests in advance and proactively allocates uplink resources to UEs. We have used Recurrent Neural Network (RNN) which is provided with the history of connection requests to predict UEs which are going to participate in contention based RACH procedure. Finally, we propose a RNN based RACH scheme where the gNB uses RNN model along with the standard RACH process to reduce preamble collisions. On doing extensive simulations, it is observed that there is a significant reduction in the number of collisions when the proposed scheme is employed in a dense user scenario thereby proving the efficacy of the proposed scheme in enabling massive access of users to 5G network.","PeriodicalId":354290,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115970987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ryan D Restivo, Laurel C. Dodson, Jian Wang, Wenkai Tan, Yongxin Liu, Huihui Wang, H. Song
{"title":"GPS Spoofing on UAV: A Survey","authors":"Ryan D Restivo, Laurel C. Dodson, Jian Wang, Wenkai Tan, Yongxin Liu, Huihui Wang, H. Song","doi":"10.1109/INFOCOMWKSHPS57453.2023.10225980","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10225980","url":null,"abstract":"With the development of the Internet of Things (IoT) and Cyber-Physical System (CPS), Unmanned Aerial Vehicles (UAVs) are deployed in various implementations which improve the performance of the IoT and reduce labor consumption significantly. As the core of UAV, Global Positioning System (GPS) is essential to provide the navigation information for UAVs to finish missions. GPS receives satellite signals and calculated localization so UAVs can recognize their positions. However, malicious attackers leverage the mechanism to generate forged GPS signals that can spoof UAV that has wrong positions. The wrong positions can lead to missions' failure and threaten public safety and private security. In this paper, we investigated the overview of GPS spoofing and explored the development of GPS spoofing on UAVs. This work can provide researchers with state-of-the-art GPS spoofing development on UAVs and inspiration for new directions in this field.","PeriodicalId":354290,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116963999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jun-Hong Huang, Shin-Ming Cheng, Rafael Kaliski, Cheng-Feng Hung
{"title":"Developing xApps for Rogue Base Station Detection in SDR-Enabled O-RAN","authors":"Jun-Hong Huang, Shin-Ming Cheng, Rafael Kaliski, Cheng-Feng Hung","doi":"10.1109/INFOCOMWKSHPS57453.2023.10225868","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10225868","url":null,"abstract":"In order to support the diverse requirements of 5G communications, a multitude of RAN components are required. To enable multiple vendor support for 5G, each of whom can independently choose components, Open-RAN (O-RAN) defined a set of standards to which the components must adhere. In addition, O-RAN defines the management elements used to manage each component to secure the 5G networks. While the proposed architecture can manage both 4G and 5G environments, including 5G NSA (Non-Standalone), it inherently suffers from the same vulnerabilities found in 4G LTE. Consequently, an attacker can use unprotected signaling and a low-cost Software Defined Radio (SDR) to launch rogue base station (RBS) attacks on the user equipment (UE), even in O-RAN architectures. In this paper, we consider the stability of signals collected from high-quality operational BSs versus cheap RBSs. Using signal stability features, we develop a machine learning (ML) based RBS detector located on the UE. With the aid of an O-RAN xAPP, ML models can be retrained using the data collected from multiple UEs, and the updated model can be delivered to UEs to enable higher detection accuracy. We conduct extensive experiments by implementing an RBS using a USRP B210, enabling O-RAN using E- Release, and data collected from operational BSs. Moreover, the detector is implemented as an Android APP, which realizes the connection to the O-RAN xAPP. The experimental results show that our detector can achieve more than 99% accuracy, precision “recall” and F1 score.","PeriodicalId":354290,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117345151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time-Constrained UAV-Aided Data Collection for IoT Networks with Energy Harvesting","authors":"Pengfei Du, Fan Xie, S. H. A. Chen, Xuejun Zhang","doi":"10.1109/INFOCOMWKSHPS57453.2023.10226065","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10226065","url":null,"abstract":"This work investigates the time-constrained unmanned aerial vehicle (UAV) aided data collection problem for Internet of Thing (IoT) networks, where multiple IoT devices (IoTDs) harvest the solar energy and send their sensed data to the UAV in the uplink by applying the time division multiple access (TDMA) method. Specifically, we propose to maximize the total number of served IoTDs in a finite data gathering period via optimizing the trajectory of UAV, the time allocation and transmitting power of IoTDs under the UAV's maximum flight speed constraint, and the energy harvesting neutralization constraint of every IoTD. To tackle this non-linear integer programming, we first convert it into an equivalent tractable problem by adding the deductive penalty into the target function, and develop the time-constrained UAV-assisted data collection algorithm (TCDCA) to achieve a sub-optimal solution by exploiting the alternating optimization, successive convex approximation (SCA) and quadratic approximation methods. Subsequently, abundant simulations results are provided to confirm that the TCDCA is able to notably enhance the total number of served IoTDs compared to the conventional scheme with constant trajectory or constant time allocation.","PeriodicalId":354290,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115494880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lay Importance on the Layer: Federated Learning for Non-IID data with Layer-based Regularization","authors":"Eleftherios Charteros, I. Koutsopoulos","doi":"10.1109/INFOCOMWKSHPS57453.2023.10226146","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10226146","url":null,"abstract":"We propose Federated Learning with Layer-Adaptive Proximation (FedLap), a new class of algorithms to tackle non-IID data. The novelty is a new regularization term in the local (client) loss function which generalizes that of FedProx and captures divergence between global and local model weights of each client, at the level of Deep Neural Network (DNN) layers. Thus, the weights of different layers of the DNN are treated differently in the regularization function. Divergence between the global and local models is captured through a dissimilarity metric and a distance metric, both applied to each DNN layer. Since regularization is applied per layer and not to all weights as in FedProx, during local updates, only the weights of those layers that drift away from the global model change, while the other weights are not affected. Compared to FedAvg and FedProx, FedLap achieves 3–5 % higher accuracy in the first 20 communication rounds, and up to 10% higher accuracy in cases of unstable client participation. Thus, FedLap paves the way for a novel layer-aware class of algorithms in distributed learning.","PeriodicalId":354290,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114693264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Asynchronous Federated Learning for Intrusion Detection in Vehicular Cyber-Physical Systems","authors":"Sunitha Safavat, D. Rawat","doi":"10.1109/INFOCOMWKSHPS57453.2023.10225917","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10225917","url":null,"abstract":"In recent years, development in IoV technologies has reached more promising progress. IoV technology helps vehicles interact and exchange information between public networks and the surrounding environment, which reduces road congestion. In order to protect the information from attack and to provide efficient data transmission, this paper proposes secure federated learning for a vehicular cyber-physical system using an Inter-polated public key and private key-ROTation (IPP-ROT)-based Elliptic Curve Cryptography (ECC) and Fed Buff: Federated Learning with Buffered Asynchronous Aggregation based Log Sigmoid Multi-Layer Perceptron (FB-FL-BAA-LSMLP) techniques. Initially, the vehicles are registered with a cloud server by generating keys and cipher text using ECC and IPP-ROT algorithms. After that, vehicle parameters are sensed by the server. As a large number of vehicles cross the Road Side Units (RSU), hashing is performed to authenticate the vehicle crossing RSUs using the Digit Folding-based Hash of Variable Length (DF-HAVAL) algorithm to avoid data collisions and uneven delays. Further, the data classification performed using FB-FL-BAA-LSMLP, which classifies data, and attacked data will be detected. At last, the performance of the proposed method is verified by comparing it with the existing techniques, and the results show better performance than the other methods.","PeriodicalId":354290,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127066146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Schemes for Improved Performance in 6TiSCH Networks","authors":"Alakesh Kalita, A. Hazra, Gurusamy Mohan","doi":"10.1109/INFOCOMWKSHPS57453.2023.10225947","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10225947","url":null,"abstract":"The 6TiSCH (IPv6 over Time Slotted Channel Hopping (TSCH) mode of IEEE 802.15.4e) network is standardized to provide high reliability, higher throughput, delay-bounded, and energy-efficient communication in various resource-constrained Internet of Things (IoT) networks. However, it is observed that 6TiSCH network suffers from load balancing issue due to the default parent selection mechanism of its de-facto routing protocol, RPL (Routing Protocol for Low power and Lossy network). Furthermore, the performance of a 6TiSCH network degrades due to improper management of nodes' queue/buffer. None of the existing works studied these problems in RPL-based 6TiSCH networks. Therefore, in this work, we first validate these two problems using testbed experiments. Then, we propose an Early Parent Switching (EPS) scheme to deal with the load balancing problem of RPL by which nodes are allowed to change their parents depending on the remaining queue capacity of the parents. We propose another scheme named Parrondo’ Paradox based Queue Management (PPQM) for efficiently managing the nodes' queue so that buffer overflow can be reduced. We implement EPS and PPQM on Contiki-NG OS and perform testbed experiments on FIT IoT-LAB. Testbed experiment results show that both the proposed schemes can significantly improve the performance of 6TiSCH networks.","PeriodicalId":354290,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126112345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Asif Habibi, Adrián Gallego Sánchez, Ignacio Labrador Pavón, Bin Han, P. Serrano, Jesús Pérez-Valero, A. Virdis, H. Schotten
{"title":"The Architectural Design of Service Management and Orchestration in 6G Communication Systems","authors":"Mohammad Asif Habibi, Adrián Gallego Sánchez, Ignacio Labrador Pavón, Bin Han, P. Serrano, Jesús Pérez-Valero, A. Virdis, H. Schotten","doi":"10.1109/INFOCOMWKSHPS57453.2023.10225846","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10225846","url":null,"abstract":"In this poster paper, we propose and demonstrate an architectural framework for service Management and Orches-tration (M&O) in Sixth-Generation (6G) communication systems. This architecture was designed by the Hexa-X project, which is a European flagship project dedicated to developing a vision and technological enablers for 6G. To provide a comprehensive and high-level description, we consider three views: (i) Functional View; (ii) Structural View; and (iii) Deployment View. We first discuss 6G service M&O before delving deeper into each view.","PeriodicalId":354290,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127119181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}